Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec cover image

Defensive Security Podcast Episode 189

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

00:00

- Is It a Configer Exploited House?

This is effectively very similar to confier, or theevulner that configer used. What if all the confier exploited house are really just honey pots set up to get exploited by configer? You don't know. This just raw in the net. But honypots are fun if you're looking for a project. Get it donedon't expose windows. Yu S and b ports to the internut ever, it's a terrible idea. It's da,. i mean, i just can't. I'm consi confiker exploited m s o eight o six seven back on the day. My android phone doesn't fall victim to this. Just say it. Lennox

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app